Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3232802
|View full text |Cite
|
Sign up to set email alerts
|

Towards In-Network Security for Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…With SDN, changes to network separation can be configured quickly, e.g., to counter cyber attacks. Likewise, SDN can be used to enforce network compliant behavior, e.g., specified using communication rules by the operator of the communication network [ 109 , 110 ]. Dong et al [ 111 ] and White et al [ 112 ] provide more information on the opportunities and challenges of using SDN for smart grid resilience.…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%
“…With SDN, changes to network separation can be configured quickly, e.g., to counter cyber attacks. Likewise, SDN can be used to enforce network compliant behavior, e.g., specified using communication rules by the operator of the communication network [ 109 , 110 ]. Dong et al [ 111 ] and White et al [ 112 ] provide more information on the opportunities and challenges of using SDN for smart grid resilience.…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%
“…The IoT botnet infection attempts typically involve port scanning, vulnerability exploitation and transfer and execution of bot malware. The detection may be performed by a network intrusion detection system (NIDS) [26] at the network perimeter, or by a host intrusion detection system (HIDS) [27] or antivirus operating on the device. A NIDS typically monitors the network traffic while an antivirus or a HIDS inspect system changes and program execution.…”
Section: B Iot Botnet Detectionmentioning
confidence: 99%
“…Hence, in a simple environment, advanced users [75] can customise the pre-defined policies [172,73], such as MUD [101], to meet their security and privacy requirements. Smart spaces also include other security services such as IDS [161,134,40,116]. Thus, there are three main security components for smart spaces: user input, pre-defined IoT policies, and network security middleboxes, which need to be incorporated when designing smart space security system.…”
Section: Motivationmentioning
confidence: 99%